General

  • Target

    7e2b32ef3945b61334c333b614de6007489a256823bbfb225755c827b2f85fd1

  • Size

    4.5MB

  • Sample

    221124-28hsvsab7y

  • MD5

    eddc486ca6063beb669e0b07399c4409

  • SHA1

    d1017d098a70997a94631ff081379930019f19df

  • SHA256

    7e2b32ef3945b61334c333b614de6007489a256823bbfb225755c827b2f85fd1

  • SHA512

    1b76e7316187a2efa44e5b1ab99c8e644b7d6598b99c41f9106be7579fd446a64ee32c78d913041d9f0c921278ded4ddb7d90e279272d482c59dec4242b9b231

  • SSDEEP

    49152:QIaK6pJEqd+Ti0Haxup4Dc2ppWmD/M2BKQl+9buOBqFyjSlM/Zf0weeDNxMB:VOJEf20D2pp1D/EbuOBqFyj8MNtLNxM

Malware Config

Targets

    • Target

      7e2b32ef3945b61334c333b614de6007489a256823bbfb225755c827b2f85fd1

    • Size

      4.5MB

    • MD5

      eddc486ca6063beb669e0b07399c4409

    • SHA1

      d1017d098a70997a94631ff081379930019f19df

    • SHA256

      7e2b32ef3945b61334c333b614de6007489a256823bbfb225755c827b2f85fd1

    • SHA512

      1b76e7316187a2efa44e5b1ab99c8e644b7d6598b99c41f9106be7579fd446a64ee32c78d913041d9f0c921278ded4ddb7d90e279272d482c59dec4242b9b231

    • SSDEEP

      49152:QIaK6pJEqd+Ti0Haxup4Dc2ppWmD/M2BKQl+9buOBqFyjSlM/Zf0weeDNxMB:VOJEf20D2pp1D/EbuOBqFyj8MNtLNxM

    • Registers COM server for autorun

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops Chrome extension

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Browser Extensions

1
T1176

Defense Evasion

Modify Registry

3
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Tasks